Search Results - (( data evaluation sensor algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- evaluation sensor »
- sensor algorithm »
- data evaluation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
6
-
7
An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications
Published 2019“…This work provides an extensive analysis for the design and performance evaluation of real-time data collection model for multivariate sensors in IoT applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Our evaluation suggests that the proposed algorithm can be approximately 39.9% more efficient than its counterparts for various data sets in terms of computational time.…”
Get full text
Get full text
Article -
9
Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network
Published 2020“…On the other hand, multi-hop optimization algorithm will form a multi-hop network by transmitting data to base station (BS) through data multi-hopping between sensor nodes. …”
Get full text
Get full text
Article -
10
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The performance evaluation of the proposed data gathering algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
Get full text
Get full text
Thesis -
12
Satellite attitude determination utilizing measurement sensor data and kalman filtering
Published 2006“…This algorithm utilizes the three axis rate gyros for the satellite angular rate data and star camera line-of-sight measurements. …”
Get full text
Get full text
Article -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
14
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
Get full text
Get full text
Get full text
Article -
15
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…These factors necessitate the creation of an energy-efficient routing algorithm to minimize energy consumption and extend sensor lifetimes. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
17
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
18
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025Subjects:Conference paper -
20
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Wireless Sensor Networks (WSNs) significantly impact reliable data communications in environmental monitoring, health care, and transportation applications. …”
Article
